Data Encryption Standard

Results: 514



#Item
441Key management / Brute-force attack / A5/1 / EFF DES cracker / Cipher / Block cipher / Symmetric-key algorithm / Weak key / Advantage / Cryptography / Data Encryption Standard / Stream ciphers

TCSI[removed]..16

Add to Reading List

Source URL: www.copacobana.org

Language: English - Date: 2008-11-03 10:06:11
442Vigenère cipher / Hill cipher / Cryptanalysis / Rotor machine / Caesar cipher / Symmetric-key algorithm / Atbash / Enigma machine / Data Encryption Standard / Cryptography / Substitution cipher / Cipher

History of Cryptography This article is dedicated to a short history of cryptography, from ancient times to our days, without the

Add to Reading List

Source URL: www.logicalsecurity.com

Language: English - Date: 2008-09-10 02:14:47
443Block cipher / Advanced Encryption Standard / Cryptanalysis / Key schedule / CS-Cipher / Cipher / Slide attack / Data Encryption Standard / Index of cryptography articles / Cryptography / Differential cryptanalysis / Linear cryptanalysis

The CS2 Block Cipher Tom St Denis Secure Science Corporation

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-03-28 14:40:08
444Linear cryptanalysis / Data Encryption Standard / Differential cryptanalysis / Key schedule / Advanced Encryption Standard / Weak key / Serpent / Q / International Data Encryption Algorithm / Cryptography / Block ciphers / ICE

Serpent: A Proposal for the Advanced Encryption Standard Ross Anderson1

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2006-07-27 07:39:15
445GOST / Slide attack / Chosen-plaintext attack / Ciphertext / Data Encryption Standard / Differential cryptanalysis / Cryptanalysis / Linear cryptanalysis / Integral cryptanalysis / Cryptography / Espionage / GOST standards

Improved Slide Attacks Eli Biham

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2009-07-29 02:01:14
446Substitution cipher / Chosen-plaintext attack / Cryptanalysis / Plaintext / Cipher / Frequency analysis / Data Encryption Standard / Initialization vector / One-time pad / Cryptography / Espionage / Ciphertext

397 PROCEEDINGS OF THE IEEE, VOL. 67, NO. 3, MARCH 1979

Add to Reading List

Source URL: www-ee.stanford.edu

Language: English - Date: 2005-09-13 19:40:07
447Computer memory / Backdoor / Malware / Rootkits / Spyware / Hardware random number generator / Dynamic random-access memory / Microcontroller / Data Encryption Standard / Cryptography / Espionage / Computer hardware

Silencing Hardware Backdoors Adam Waksman

Add to Reading List

Source URL: www.cs.columbia.edu

Language: English - Date: 2011-03-04 18:48:26
448ICE / Advanced Encryption Standard / Integral cryptanalysis / International Data Encryption Algorithm / CRYPTREC / SHARK / Crypt / Blowfish / Cryptography / Block ciphers / Hierocrypt

1 Improved SQUARE Attacks Against

Add to Reading List

Source URL: www.cosic.esat.kuleuven.be

Language: English
449Data Encryption Standard / Cisco PIX / Cisco ASA / Triple DES / Advanced Encryption Standard / UES / Cisco IOS / Cryptography / Computer network security / Server appliance

C H A P T E R A

Add to Reading List

Source URL: www.cisco.com

Language: English - Date: 2013-05-08 18:45:01
450Advanced Encryption Standard process / National Institute of Standards and Technology / Serpent / Data Encryption Standard / MARS / Key schedule / Q / RC6 / Twofish / Cryptography / Block ciphers / Advanced Encryption Standard

The Case for Serpent Ross Anderson, Eli Biham and Lars Knudsen 24th March 2000

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2006-07-27 07:35:00
UPDATE